Review on location privacy protection research
-
摘要: 近年来,随着无线通信技术和定位技术的发展,与基于位置服务(LocationBased Services,LBS)有关的应用受到越来越多人的使用和重视.一方面LBS为人们的生活带来了很大的便利,而另一方面用户的隐私泄露风险也成为最大的安全威胁.用户的隐私主要包括用户时空位置隐私、有关时间序列的轨迹隐私和用户身份隐私.国内外研究学者针对该问题的基于不同的隐私保护技术系统结构提出了诸多解决方法,可分为假名技术、假位置技术和隐匿时空技术,分别保护了用户的身份信息隐私、位置隐私和轨迹隐私.本文对比现有的隐私保护技术,分析了LBS面临的挑战,归纳了现有的研究工作,并指出了未来的研究方向.
-
关键词:
- 基于位置服务(LBS) /
- 隐私保护 /
- 假名 /
- 假地址 /
- 隐匿时空
Abstract: In recent years, with the development of wireless communication technology and mobile positioning technology, applications relating to locationbased services (LBS) are increasingly taken seriously and used widely. On the one hand, LBS brings people considerable convenience; on the other hand, it becomes a nonnegligible security threat that users privacy, mainly including location privacy, trajectory privacy and identity privacy, could be leaked out. Many solutions on the basis of different structures of privacy protection system have been proposed by researchers at home and abroad, which can be divided into pseudonym, faked locations and spatial and temporal cloaking, protecting users identity privacy, location privacy and trajectory privacy respectively. In this paper, we contrast the existing privacy protection technologies and analyze challenges LBS is facing. At the same time, we conclude the existing researches and give directions for future research. -
[1] [1]〖ZK(#〗ILARRI S, MENA E, ILLARRAMENDI A. Locationdependent query processing: Where we are and where we are heading[J]. ACM Computing Surveys (CSUR), 2010, 42(3):12.[2]PERUSCO L, MICHAEL K. Control, trust, privacy, and security: Evaluating locationbased services[J]. IEEE Technology and Society Magazine, 2007, 26(1): 416.[3]SCHILLER J H, VOISARD A. LocationBased Services[M]. San Francisco: Morgan Kaufmann, 2004.[4]VEIJALAINEN J, WESKE M. Modeling static aspects of mobile electronic commerce environments[M]//Advances in Mobile Commerce Technologies. \[s.l.\]: IGI Publishing, 2003: 137170.[5]BARNES R, LEPINSKI M, COOPER A, et al. An architecture for location and location privacy in internet applications[R]. BCP 160, RFC 6280, 2011.[6]KALNIS P, GHINITA G, MOURATIDIS K, et al. Preventing locationbased identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 17191733.[7]XIONG X, MOKBEL M F, AREF W G. Seacnn: Scalable processing of continuous knearest neighbor queries in spatiotemporal databases[C]//Proceedings of the 21st International Conference on Data Engineering. IEEE, 2005: 643654.[8]DAMIANI M L, BERTINO E, SILVESTRI C. The PROBE framework for the personalized cloaking of private locations[J]. Transactions on Data Privacy, 2010, 3(2): 123148.[9]GHINITA G, KALNIS P, SKIADOPOULOS S. Prive: Anonymous locationbased queries in distributed mobile systems[C]//Proceedings of the 16th International Conference on World Wide Web. ACM, 2007: 371380.[10]CHE Y, CHIEW K, HONG X, et al. SALS: semanticsaware location sharing based on cloaking zone in mobile social networks[C]//Proceedings of the 1st ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems. ACM, 2012: 4956.[11]NERGIZ M E, ATZORI M, SAYGIN Y, et al. Towards trajectory anonymization:A generalizationbased approach[J]. IEEE Transactions on Data Privacy, 2009, 2(1):4775.[12]CHENG R, ZHANG Y, BERTINO E, et al. Preserving user location privacy in mobile data management infrastructures[M]//Privacy Enhancing Technologies. Berlin: Springer, 2006: 393412.[13]GRUTESER M, GRUNWALD D. Anonymous usage of locationbased services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. ACM, 2003: 3142.[14]XIAO Z, MENG X, XU J. Quality aware privacy protection for locationbased services[M]//Advances in Databases: Concepts, Systems and Applications. Berlin: Springer, 2007: 434446.[15]HONG J I, LANDAY J A. An architecture for privacysensitive ubiquitous computing[C]//Processing of the 2nd International Conference on Mobile Systems, Applications, and Services. ACM, 2004, 177189.[16]CHAUM D. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981: 24(2):8490.[17]BERESFORD A R, STAJANO F. Location privacy in pervasive computing[J]. IEEE Pervasive computing, 2003, 2(1): 4655.[18]HEECHANG SHIN, ATLURI V, VAIDYA J. A profile anonymization model for privacy in a personalized locationbased service environment[C]// Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008: 7380.[19]SHIN K G, JU X, CHEN Z, et al. Privacy protection for users of locationbased services[J]. IEEE Wireless Communications, 2012, 19(1): 3039.[20]DUCKHAM M, KULIK L. A formal model of obfuscation and negotiation for location privacy[M]//Pervasive Computing. Berlin: Springer, 2005: 152170.[21]CHOW C Y, MOKBEL M F, LIU X. A peertopeer spatial cloaking algorithm for anonymous locationbased service[C]//Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. ACM, 2006: 171178.[22]BAMBA B, LIU L, PESTI P, et al. Supporting anonymous location queries in mobile environments with privacygrid[C]//Proceedings of the 17th International Conference on World Wide Web. ACM, 2008: 237246.[23]MOKBEL M F, CHOW C Y, AREF W G. The new casper: Query processing for location services without compromising privacy[C]//Proceedings of the 32nd International Conference on Very Large Data Bases. ACM, 2006: 763774.[24]CHOW C Y, MOKBEL M F, LIU X. Spatial cloaking for anonymous locationbased services in mobile peertopeer environments[J]. GeoInformatica, 2011, 15(2): 351380.[25]霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报, 2011(10):18201830.[26]XU T, CAI Y. Exploring historical location data for anonymity preservation in locationbased services[C]//Proceedings of the 27th Conference on Computer Communications. IEEE, 2008: 547555.[27]TERROVITIS M, MAMOULIS N. Privacy preserving in the publication of trajectories[C]//Proceedings of the 9th International Conference on Mobile Data Management. IEEE, 2008:6572.[28]LU R, LIN X, LIANG X, et al. A dynamic privacypreserving key management scheme for locationbased services in vanets[J]. IEEE Transactions on Intelligent Transportation Systems, 2012, 13(1): 127139.[29]FREUDIGER J, SHOKRI R, HUBAUX J P. Evaluating the privacy risk of locationbased services[M]//Financial Cryptography and Data Security. Berlin: Springer, 2012: 3146.[30]朱辉, 李晖, 高丽娟, 等. 面向基于位置服务的用户隐私保护系统及方法: 中国,CN104219245A\[P\]. 20141217.[31]PINGLEY A, YU W, ZHANG N, et al. Cap: A contextaware privacy protection system for locationbased services[C]//Proceedings of the 29th IEEE International Conference on Distributed Computing Systems. IEEE, 2009: 4957.[32]魏琼, 卢炎生. 位置隐私保护技术研究进展[J]. 计算机科学, 2008(09):2125.[33]EL DEFRAWY K, TSUDIK G. Privacypreserving locationbased ondemand routing in MANETs[J]. IEEE Journal on Selected Areas in Communications, 2011, 29(10): 19261934.[34]HU H, LEE D L. Range nearestneighbor query[J]. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 7891.[35]余荣芳. 位置服务隐私保护技术的研究与应用[D].南京:南京理工大学, 2013.[36]王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014(04)693712.[37]潘晓, 肖珍, 孟小峰. 位置隐私研究综述[J]. 计算机科学与探索, 2007(03)268281.[38]郭艳华. 位置服务中轨迹隐私保护方法的研究[D].武汉:华中师范大学, 2011.[39]谈嵘. 位置隐私保护及其在基于位置的社交网络服务中的应用研究[D].上海:华东师范大学, 2013.[40]车延辙. 基于位置服务中用户位置隐私保护关键技术研究[D].杭州:浙江大学, 2013.[41]屈浩. 基于轨迹隐私的匿名方法研究[D].成都:电子科技大学, 2013.[42]张浩. 基于位置服务的信息隐私保护技术研究[D].合肥:中国科学技术大学, 2014.[43]娄绿林. 基于位置服务(LBS)的隐私保护方案研究[D].昆明:昆明理工大学, 2013.[44]郭晓丽. 基于位置服务的移动对象隐私保护技术研究[D].哈尔滨:哈尔滨工程大学, 2013.[45]GHINITA G, KALNIS P, KHOSHGOZARAN A, et al. Private queries in locationbased services: Anonymizers are not necessary[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM, 2008: 121132.[46]CHENG R, ZHANG Y, BERTINO E, et al. Preserving user location privacy in mobile data management infrastructures[M]//Privacy Enhancing Technologies. Berlin: Springer, 2006: 393412.[47]GEDIK B, LIU L. Location privacy in mobile systems: A personalized anonymization model[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. IEEE, 2005: 620629.[48]KIDO H, YANAGISAWA Y, SATOH T. An anonymous communication technique using dummies for locationbased services[C]//Proceedings of the International Conference on Pervasive Services. IEEE, 2005: 8897.[49]KANG H E, MENG W U. Protecting location privacy with personalized Kanonymity[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2012(6): 014.[50]贾金营, 张凤荔. 位置隐私保护技术综述[J]. 计算机应用研究, 2013(03):641646.[51]王家波. 基于位置服务的轨迹隐私保护技术研究[D].杭州:杭州电子科技大学, 2014.[52]侯士江. 基于空间K匿名的位置隐私保护技术研究[D].秦皇岛:燕山大学, 2014.[53]薛姣, 刘向宇, 杨晓春, 等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011(05): 865878.[54]LUPER D, CAMERON D, MILLER J A, et al. Spatial and temporal target association through semantic analysis and GPS data mining[C]//Proceedings of the 2007 International Conference on Information and Knowledge Engineering. IKE, 2007:251257.[55]许隽. 基于位置服务中个性化位置隐私保护模型与算法的研究[D].广州:华南理工大学, 2013.
点击查看大图
计量
- 文章访问数: 1359
- HTML全文浏览量: 48
- PDF下载量: 769
- 被引次数: 0